First published: Sat Mar 07 2020(Updated: )
An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-825 Firmware | =2.10 | |
Dlink Dir-825 | ||
Trendnet Tew-632brp Firmware | =1.010b32 | |
TRENDnet TEW-632BRP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-10216.
D-Link DIR-825 Rev.B 2.10 devices and TRENDnet TEW-632BRP 1.010B32 are affected by this vulnerability.
The severity of CVE-2020-10216 is critical with a CVSS score of 8.8.
Remote attackers can exploit CVE-2020-10216 by executing arbitrary commands via the date parameter in a system_time.cgi POST request.
Yes, you can find references for this vulnerability at the following links: [Link 1](https://github.com/kuc001/IoTFirmware/blob/master/D-Link/vulnerability1.md), [Link 2](https://github.com/kuc001/IoTFirmware/blob/master/Trendnet/Trendnet-TEW-632.pdf).